News

VMware fixed four vulnerabilities in VMware ESXi, Workstation, Fusion, and Tools that were exploited as zero-days during the ...
REverse Tactics has been credited by Broadcom for two CVEs: CVE-2025-41237, a critical out-of-bounds write vulnerability that can be exploited by a privileged attacker on a VM to execute arbitrary ...
Viettel Cyber Security secured the runner-up spot at Pwn2Own Berlin, earning USD 155,000 and discovering major vulnerabilities.
The next scheduled Pwn2Own hacking competition has lost Hewlett-Packard as its longstanding sponsor amid legal concerns that the company could run afoul of recent changes to an international ...
Pwn2Own Miami 2022 has ended with competitors earning $400,000 for 26 zero-day exploits (and several bug collisions) targeting ICS and SCADA products demoed during the contest between April 19 and ...
In the world of IT security, there is no other more prestigious computer hacking contest than Pwn2Own. Founded in 2007 and organized by Trend Micro's Zero-Day Initiative (ZDI), the competition ...
Security researcher Charlie Miller, who last year won $10,000 for hacking into a MacBook Air via Safari in just two minutes, says he thinks Safari will be the first browser to fall at this year's ...
The annual Pwn2Own hacker contest kicks off today with new rules, controversy over disclosure and the absence of a regular participant.
The Tesla Model 3 is considered one of the most secure vehicles around. Now there are half a million dollars on offer to anyone who can prove otherwise.
Chrome has survived Pwn2Own without a successful attack to take the $20k prize, but don't let that dupe you into believing the browser is invulnerable.
Security researchers demonstrated zero-day exploits against Google Chrome, Microsoft Internet Explorer, Apple Safari, Mozilla Firefox and Adobe Flash Player during the second day of the Pwn2Own ...